Patents by Inventor Krzysztof Rudek

Krzysztof Rudek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10929271
    Abstract: A method for finding the cause of an error or unexpected behavior of a software application includes providing a list of steps to be executed in order to achieve a certain behavior of the application in a usage scenario and providing a decision tree corresponding with the usage scenario. The decision tree comprises decision nodes that correspond with the steps in the sequence of steps to be executed and leaf nodes indicating one or more possible solutions. The method includes scanning log files to determine whether a step in the list of steps to be executed has not been executed and traversing the decision tree when a step in the list of steps has not been executed. A leaf node of the decision tree that corresponds to a non-executed step is determined and a solution is extracted from the determined leaf node.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: February 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
  • Patent number: 10891365
    Abstract: Approaches presented herein enable restricting access to a locked computing resource in a web browser with a user-tailored CAPTCHA. More specifically, a request for a CAPTCHA is obtained from a web browser of a user attempting to access a resource. A set of terms associated with the user are selected from a pool of terms collected from an environment of the user within a pre-determined time period. A familiarity value of the selected terms indicating a recognizability of the terms by the user is determined. A CAPTCHA of the selected set of terms is generated having a level of graphic noise corresponding to the familiarity value. The generated CAPTCHA is then sent to the web browser. When a response to the CAPTCHA is received from the web browser, it is analyzed to determine whether the response matches the selected set of terms. If so, the web browser is instructed to grant the user access to the resource.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: January 12, 2021
    Assignee: International Business Machines Corporation
    Inventors: Konrad Wojciech Komnata, Grzegorz Piotr Szczepanik, Tomasz Hanusiak, Krzysztof Rudek
  • Patent number: 10841329
    Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive security system. The cognitive security system generates a violation array. Each entry of the violation array represents identification of a workflow activity that violates a security policy. Responsive to a new workflow orchestration being created by a user, the cognitive security system compares each activity of the new workflow orchestration to the violation array. Responsive to determining a given activity of the new workflow orchestration exists in the violation array, the cognitive security system recommends to the user to remove the given activity from the new workflow orchestration.
    Type: Grant
    Filed: August 23, 2017
    Date of Patent: November 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Vinod A. Valecha, Krzysztof A. Rudek, Markus Blohberger
  • Patent number: 10795982
    Abstract: Approaches presented herein enable restricting access to a locked computing resource in a web browser with a user-tailored CAPTCHA. More specifically, a request for a CAPTCHA is obtained from a web browser of a user attempting to access a resource. A set of terms associated with the user are selected from a pool of terms collected from an environment of the user within a pre-determined time period. A familiarity value of the selected terms indicating a recognizability of the terms by the user is determined. A CAPTCHA of the selected set of terms is generated having a level of graphic noise corresponding to the familiarity value. The generated CAPTCHA is then sent to the web browser. When a response to the CAPTCHA is received from the web browser, it is analyzed to determine whether the response matches the selected set of terms. If so, the web browser is instructed to grant the user access to the resource.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: October 6, 2020
    Assignee: International Business Machines Corporation
    Inventors: Konrad Wojciech Komnata, Grzegorz Piotr Szczepanik, Tomasz Hanusiak, Krzysztof Rudek
  • Publication number: 20200293514
    Abstract: Systems and methods for managing access to data in a network are provided. In embodiments, a method includes: receiving, by a computer device, a search request regarding data of a participant, the search request including participant parameters associated with the participant; generating, by the computer device, a record of data associated with the participant based on the search request; sending, by the computer device, a request for data to third party nodes of a blockchain system based on the search request and the record; receiving, by the computer device, results from the blockchain system, the results including at least one set of data from a first node of the third party nodes; and determining, by the computer device, that the set of data requires updating based on the results.
    Type: Application
    Filed: March 12, 2019
    Publication date: September 17, 2020
    Inventors: Krzysztof RUDEK, Vinod A. VALECHA, Grzegorz Piotr SZCZEPANIK, Lukasz Jakub PALUS
  • Patent number: 10762213
    Abstract: A method and system for improving memory storage and threat detection is provided. The method includes requesting and authorizing permission for executing analysis code for determining if a service device is in compliance with general data protection regulations. In response, executable code is uploaded to the database hardware controller and a first database and a second database is analyzed with respect to patterns associated with the general data protection regulations. Associated results code is generated and transmitted the service device. The results code is executed with respect to the first database and the second database resulting in a storage space increase in the first database and the second database thereby improving operational functions of the first database and the second database.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Krzysztof Rudek, Grzegorz P. Szczepanik, Lukasz Jakub Palus, Tomasz Hanusiak
  • Publication number: 20200174966
    Abstract: Systems, methods, tools and computer programming products for implementing a cognitive data lake that selects or recommends operational database based on historically created data lakes storing files having similar file types, categorizations, metadata, and/or frequency of file usage. Selecting the appropriate operational databases is streamlined by building a knowledge base that is accessible during the creation and/or registration of each data lake. The knowledge base maintains historical records of past data lakes, describing each historical data lake's file types, attributes, metadata, frequency of file usage and at least one operational database implemented to manage the files of the historical data lake.
    Type: Application
    Filed: November 30, 2018
    Publication date: June 4, 2020
    Inventors: Grzegorz P. Szczepanik, Krzysztof A. Rudek, Tomasz Hanusiak, Konrad W. Komnata
  • Publication number: 20200174978
    Abstract: The present invention generally relates to web applications, and, more particularly, to a distributed virtual control system (VCS) configured to track changes by users to web applications. For this purpose, a system includes a user device configured to access a web server, which includes a web application stored in the web server, wherein the web application is accessible by another user device to make changes to the web application, which changes are stored in a historical collection of versions of the web application in an original repository. The user device is configured to allow the user device to access the historical collection of versions of the web application in the original repository, and to store the changes to the web application made by the other user device in the historical collection of versions of the web application in a first local repository in the user device.
    Type: Application
    Filed: December 4, 2018
    Publication date: June 4, 2020
    Inventors: Krzysztof RUDEK, Tomasz HANUSIAK, Grzegorz P. SZCZEPANIK, Konrad W. KOMNATA
  • Publication number: 20200134187
    Abstract: A method and system for improving memory storage and threat detection is provided. The method includes requesting and authorizing permission for executing analysis code for determining if a service device is in compliance with general data protection regulations. In response, executable code is uploaded to the database hardware controller and a first database and a second database is analyzed with respect to patterns associated with the general data protection regulations. Associated results code is generated and transmitted the service device. The results code is executed with respect to the first database and the second database resulting in a storage space increase in the first database and the second database thereby improving operational functions of the first database and the second database.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 30, 2020
    Inventors: Krzysztof Rudek, Grzegorz P. Szczepanik, Lukasz Jakub Palus, Tomasz Hanusiak
  • Publication number: 20200089814
    Abstract: A method for detecting software installed on a computer may be provided. The method may comprise obtaining a default user identifier, collecting an installed user identifier, performing an identifier comparison by comparing the installed user identifier with the default user identifier and determining whether an installed user identifier matches a default user identifier, assigning a probability value based on the identifier comparison, performing a threshold comparison of the probability value to the a predetermined threshold value, determining whether the probability value exceeds the threshold value, and in response to determining that the probability value exceeds the threshold value, concluding that the software has been installed on the computer system.
    Type: Application
    Filed: September 14, 2018
    Publication date: March 19, 2020
    Inventors: Lukasz Jakub Palus, Grzegorz P. Szczepanik, Krzysztof Rudek, Tomasz Hanusiak
  • Publication number: 20200065466
    Abstract: Approaches presented herein enable restricting access to a locked computing resource in a web browser with a user-tailored CAPTCHA. More specifically, a request for a CAPTCHA is obtained from a web browser of a user attempting to access a resource. A set of terms associated with the user are selected from a pool of terms collected from an environment of the user within a pre-determined time period. A familiarity value of the selected terms indicating a recognizability of the terms by the user is determined. A CAPTCHA of the selected set of terms is generated having a level of graphic noise corresponding to the familiarity value. The generated CAPTCHA is then sent to the web browser. When a response to the CAPTCHA is received from the web browser, it is analyzed to determine whether the response matches the selected set of terms. If so, the web browser is instructed to grant the user access to the resource.
    Type: Application
    Filed: August 23, 2018
    Publication date: February 27, 2020
    Inventors: Konrad Wojciech Komnata, Grzegorz Piotr Szczepanik, Tomasz Hanusiak, Krzysztof Rudek
  • Publication number: 20200065467
    Abstract: Approaches presented herein enable restricting access to a locked computing resource in a web browser with a user-tailored CAPTCHA. More specifically, a request for a CAPTCHA is obtained from a web browser of a user attempting to access a resource. A set of terms associated with the user are selected from a pool of terms collected from an environment of the user within a pre-determined time period. A familiarity value of the selected terms indicating a recognizability of the terms by the user is determined. A CAPTCHA of the selected set of terms is generated having a level of graphic noise corresponding to the familiarity value. The generated CAPTCHA is then sent to the web browser. When a response to the CAPTCHA is received from the web browser, it is analyzed to determine whether the response matches the selected set of terms. If so, the web browser is instructed to grant the user access to the resource.
    Type: Application
    Filed: July 25, 2019
    Publication date: February 27, 2020
    Inventors: Konrad Wojciech Komnata, Grzegorz Piotr Szczepanik, Tomasz Hanusiak, Krzysztof Rudek
  • Publication number: 20200051081
    Abstract: A computer-implemented method for verifying a transaction in a blockchain network may be provided. The blockchain network comprises nodes participating in performing the transaction. The method comprises grouping the nodes of the blockchain network into a plurality of clusters of nodes. For each cluster, the method comprises determining for each node of the cluster performance parameter values, calculating a weighted sum of the determined performance parameter values, designating the node with the highest weighted sum as cluster leader, designating a number of nodes of the cluster whose weighted sum is next to the highest weighted sum, as sub-cluster leader, the number being at least half of the total number of nodes within said cluster, and verifying the transaction for the cluster by the cluster leader and the sub-cluster leaders.
    Type: Application
    Filed: August 7, 2018
    Publication date: February 13, 2020
    Inventors: Vinod A. Valecha, Krzysztof Rudek, Markus Blohberger
  • Patent number: 10528452
    Abstract: A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
  • Publication number: 20190385195
    Abstract: Context data pertaining to a target audience to which a product is to be demonstrated can be determined. The target audience can be classified based on the context data. Classifying the target audience can include selecting an audience type out of a predefined plurality of audience types. Customization data can be generated based on the selected audience type. The customization data can be configured to customize demonstration of the product to the target audience.
    Type: Application
    Filed: June 15, 2018
    Publication date: December 19, 2019
    Inventors: Vinod A. Valecha, Krzysztof Rudek, Markus Blohberger
  • Publication number: 20190258563
    Abstract: A method for finding the cause of an error or unexpected behavior of a software application includes providing a list of steps to be executed in order to achieve a certain behavior of the application in a usage scenario and providing a decision tree corresponding with the usage scenario. The decision tree comprises decision nodes that correspond with the steps in the sequence of steps to be executed and leaf nodes indicating one or more possible solutions. The method includes scanning log files to determine whether a step in the list of steps to be executed has not been executed and traversing the decision tree when a step in the list of steps has not been executed. A leaf node of the decision tree that corresponds to a non-executed step is determined and a solution is extracted from the determined leaf node.
    Type: Application
    Filed: April 30, 2019
    Publication date: August 22, 2019
    Inventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
  • Patent number: 10331542
    Abstract: A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
  • Publication number: 20190068630
    Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive security system. The cognitive security system generates a violation array. Each entry of the violation array represents identification of a workflow activity that violates a security policy. Responsive to a new workflow orchestration being created by a user, the cognitive security system compares each activity of the new workflow orchestration to the violation array. Responsive to determining a given activity of the new workflow orchestration exists in the violation array, the cognitive security system recommends to the user to remove the given activity from the new workflow orchestration.
    Type: Application
    Filed: August 23, 2017
    Publication date: February 28, 2019
    Inventors: Vinod A. Valecha, Krzysztof A. Rudek, Markus Blohberger
  • Publication number: 20180107584
    Abstract: A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior.
    Type: Application
    Filed: December 11, 2017
    Publication date: April 19, 2018
    Inventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
  • Patent number: 9928512
    Abstract: A system for intelligently determining changes to a service provider user's parameters in the service provider system. The system generally includes a service provider's computer system which contains a computer and a user database stored thereon; a user carried service provider tool, such as an ATM card, a cell phone, and the like; and a remote device whose use by the user is monitored by the service provider, such as an ATM machine (e.g., if the service provider is a bank and the service provider tool is an ATM card) or a phone or cell tower (e.g., if the service provider is a telecommunications service provider and the tool is a cell phone). Activity amongst the computer system, user carried service provider tool, and remote device is wirelessly monitored by the service provider (or an agent of the service provider) in an electronic communications network.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Pablo R. M. Gonzalez, Tiago Pagani, Krzysztof A. Rudek, Vinod A. Valecha